Firewall Approach to Internet Security - Tutorial
Table of Contents
Firewall Approach Overview
Concepts
Why Firewalls?
Further Study
Firewall Components
Section Overview
Filtering Routers
How packets are filtered out?
What information is used for filtering decision?
Examples
Protecting from the IP spoofing of internal addresses
Allowing only electronic mail traffic
Why Filtering Routers are not enough?
Further Study
Application Gateways - Proxies
Overview
How proxy program works?
How external client is enforced to contact proxy server?
How internal client is enforced to contact proxy server?
Further Study
Firewall Architectures
Section Overview
Screening Router Architecture
Dual-Homed Host Architecture
Screened Host Architecture
Screened Subnet Architecture
Further Study
References